{"id":4337,"date":"2015-08-06T15:55:00","date_gmt":"2015-08-06T15:55:00","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4337"},"modified":"2019-11-15T07:02:53","modified_gmt":"2019-11-15T12:02:53","slug":"apple-invoice","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/apple-invoice\/4337\/","title":{"rendered":"An invoice bug in Apple&#8217;s stores: a big trouble that passed by"},"content":{"rendered":"<p>Apple <a href=\"https:\/\/threatpost.com\/apple-patches-remote-invoice-vulnerability-in-itunes-app-store\/113989\" target=\"_blank\" rel=\"noopener nofollow\">patched <\/a>a serious issue in its App Store and iTunes Store, which could have undermined many\u00a0of the businesses working in this ecosystem. A remote attacker could inject malicious script into invoices that came from Apple, which would subsequently lead to session hijacking, phishing, and redirect.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>An invoice bug in Apple\u2019s stores: a big trouble that passed by #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FCxf5&amp;text=An+invoice+bug+in+Apple%26%238217%3Bs+stores%3A+a+big+trouble+that+passed+by+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The information about the vulnerability became public late in July, while Apple had apparently patched the flaw a month prior \u2013 so the flaw isn\u2019t there anymore.<\/p>\n<p>The issue, an application-side input validation web vulnerability, was tied to the fact that when it comes to purchase invoices, Apple uses the name of users\u2019 devices. According to Threatpost\u2019s <a href=\"https:\/\/threatpost.com\/apple-patches-remote-invoice-vulnerability-in-itunes-app-store\/113989\" target=\"_blank\" rel=\"noopener nofollow\">publication<\/a>, it is something that attackers can manipulate via script code. User device names are usually arbitrary, but according to the security expert who discovered the bug, the App Store and iTunes take that device value and encodes it \u201cwith the wrong conditions.\u201d<\/p>\n<p>This means if an attacker were to put their code through Apple\u2019s invoicing system, it would result in an application-side script code execution. After a purchase from either the App Store or iTunes, the invoice gets sent to the target\u2019s email and triggers the malicious code.<\/p>\n<p>Severity level of this vulnerability is (was) considered high. Aside from the proof of concept, there are no reports of actual exploitation of the flaw, which is definitely good news.<\/p>\n<p>In general, Apple\u2019s software and its stores have a good reputation, security-wise. The company invests a lot of effort in security, even though <a href=\"https:\/\/www.kaspersky.com\/blog\/keyboard-spies-now-on-iphones\/\" target=\"_blank\" rel=\"noopener nofollow\">hiccups do occur<\/a>, albeit quite rarely.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Blind confidence is not good \u2013\u00a0especially with #cybersecurity<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FCxf5&amp;text=Blind+confidence+is+not+good+%26%238211%3B%C2%A0especially+with+%23cybersecurity\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>That\u2019s why the revelation of this bug is especially noteworthy. The possible attack would put at risk many businesses and individuals, who have become comfortable in\u00a0assuming nothing perilous comes from Apple\u2019s software and media stores. However, this particular bug shows that its infrastructure is not necessarily impeccable.<\/p>\n<p>https:\/\/business.kaspersky.com\/android-financial-attacks-and-current-security-status\/3901<\/p>\n<p>This is a wide-scale problem, not limited to Apple\u2019s stores (cybercriminals would rather choose <a href=\"https:\/\/business.kaspersky.com\/android-financial-attacks-and-current-security-status\/3901\" target=\"_blank\" rel=\"noopener nofollow\">other systems than Apple\u2019s platforms<\/a>). So it is highly recommended to stay alert \u2013 always \u2013 and keep security solutions active constantly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple patched a serious issue in its App Store and iTunes Store, which could have undermined many of the businesses working in this ecosystem.<\/p>\n","protected":false},"author":209,"featured_media":15336,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2329,14,27,268],"class_list":{"0":"post-4337","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-app-store","10":"tag-apple","11":"tag-itunes","12":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apple-invoice\/4337\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apple-invoice\/4337\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apple-invoice\/4337\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/app-store\/","name":"App Store"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4337"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4337\/revisions"}],"predecessor-version":[{"id":30435,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4337\/revisions\/30435"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15336"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}